Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Automated Honey Document Generation Using Genetic Algorithm

    Sensitive data exfiltration attack is one of predominant threats to cybersecurity. The honey document is a type of cyber deception technology to address this issue. Most existing works focus on the honey docum...

    Yun Feng, Baoxu Liu, Yue Zhang, **li Zhang in Wireless Algorithms, Systems, and Applicat… (2021)

  2. No Access

    Chapter and Conference Paper

    Node Isolated Strategy Based on Network Performance Gain Function: Security Defense Trade-Off Strategy Between Information Transmission and Information Security

    The development of information transmission has greatly accelerated the progress of society, and along with this, the security of information brings hidden threats to individual in the network. In this paper, ...

    Gang Wang, Shiwei Lu, Yun Feng, Wenbin Liu, Runnian Ma in Recent Advances in Data Science (2020)

  3. No Access

    Chapter and Conference Paper

    Design and Research of Trusted Acquisition Terminals Based on Domestic Password

    As one of the core equipment of power consumption information collection system, the acquisition terminal carries a large amount of data and faces many information security risks. This paper analyzes the trus...

    Yun Feng, **aobing Liang, Feng Zhai, Meng Xu in Web, Artificial Intelligence and Network A… (2019)

  4. No Access

    Chapter and Conference Paper

    Table Tennis Service Umpiring System Based on Video Identification—for Height and Angle of the Throwing Ball

    is a very rapid movement in competitive sports, and its referee needs to make a judgment based on observation and experience within a few seconds, which is a very challenge task. Due to the subjective judgm...

    Yun-feng Ji, Chao-li Wang, Zhi-hao Shi, Jie Ren, Ling Zhu in Wearable Sensors and Robots (2017)

  5. Chapter and Conference Paper

    A Transaction Cost Equilibrium Analysis on Overlap Between Emergency Response Task Groups

    Nowadays a growing number of countries’ emergency management mechanisms are based on the network governance mechanism. The task group such as emergency support function (ESF) of the United States is the basic ...

    Yun-feng Wang in HCI in Business, Government and Organizations. Supporting Business (2017)

  6. Chapter and Conference Paper

    Erratum to: A Cognitive-Heuristic Framework for Optimization of Spaceplane-System Configurations

    Ali Sarosh, Yun-Feng Dong, Shi-Ming Chen in Foundations and Practical Applications of … (2014)

  7. No Access

    Chapter and Conference Paper

    Artificial Bee Colony Algorithm for Parametric Optimization of Spacecraft Attitude Tracking Controller

    To satisfy the rapidly and accurately attitude tracking for spacecraft, artificial bee colony (ABC) algorithm is introduced to the controller parametric optimization of spacecraft attitude tracking. The spacec...

    Shan Zhong, Yun-Feng Dong, Ali Sarosh in Foundations and Practical Applications of … (2014)

  8. No Access

    Chapter and Conference Paper

    A Cognitive-Heuristic Framework for Optimization of Spaceplane-System Configurations

    A cognitive-heuristic framework for interconnecting analytical aerothermodynamics and mass-modeling parameters to heuristic optimizer is proposed. It evaluates a complex highly-integrated forebody-inlet config...

    Ali Sarosh, Yun-Feng Dong, Shi-Ming Chen in Foundations and Practical Applications of … (2014)

  9. No Access

    Chapter and Conference Paper

    Lateral Jet Interaction Model Identification Based on Genetic Programming

    Precise lateral jet interaction models are required for missiles’ blending control strategies. Because of the complicated flow field, the interaction models are multivariable, complex and coupled. Traditional ...

    Shi-Ming Chen, Yun-Feng Dong, **ao-Lei Wang in Artificial Intelligence and Computational … (2011)

  10. No Access

    Chapter and Conference Paper

    Nonlinear System Adaptive Control by Using Multiple Neural Network Models

    Multiple radial based function (RBF)neural network models are used to cover the uncertainty of time variant nonlinear system, and multiple element controllers are set up based on the multiple RBF models. At ev...

    **ao-Li Li, Yun-Feng Kang, Wei Wang in Advances in Neural Networks - ISNN 2006 (2006)

  11. No Access

    Chapter and Conference Paper

    Two Artificial Intelligence Heuristics in Solving Multiple Allocation Hub Maximal Covering Problem

    We consider the multiple allocation hub maximal covering problem (MAHMCP): considering a serviced O–D flow was required to reach the destination optionally passing through one or two hubs in a limited time, co...

    Ke-rui Weng, Chao Yang, Yun-feng Ma in Intelligent Computing (2006)

  12. No Access

    Chapter and Conference Paper

    Another Discussion About Optimal Solution to Fuzzy Constraints Linear Programming

    In this paper, we focus on the fuzzy constraints linear programming. First we discuss the properties of an optimal solution vector and of an optimal value in the corresponding parametric programming, and propo...

    Yun-feng Tan, Bing-yuan Cao in Fuzzy Systems and Knowledge Discovery (2005)